Static task
static1
Behavioral task
behavioral1
Sample
ede7c599014671200aed462501f7e09180d9785e51b5061beac1d3c6961ae2f1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ede7c599014671200aed462501f7e09180d9785e51b5061beac1d3c6961ae2f1.exe
Resource
win10v2004-20221111-en
General
-
Target
ede7c599014671200aed462501f7e09180d9785e51b5061beac1d3c6961ae2f1
-
Size
147KB
-
MD5
9ccff45faacb1fadce0b6302a3c81b03
-
SHA1
6cb592337d58a99c714e91780058bc142943e155
-
SHA256
ede7c599014671200aed462501f7e09180d9785e51b5061beac1d3c6961ae2f1
-
SHA512
69533ed2ab9a9bf773b7e88e959001e8d01eed21c3ac298dfe229c4f71c348215e4838f3dc29197ee94a0b50cef760a285394785e6f41fdcd0d67f83ec7e0115
-
SSDEEP
3072:GjK31R8jZLP+DufRjBgMpKJs/QMRogOHnr+1:4KOKXicsOy1
Malware Config
Signatures
Files
-
ede7c599014671200aed462501f7e09180d9785e51b5061beac1d3c6961ae2f1.exe windows x86
a612624b663a1079b87e7d6c2e4944ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
FindClose
CreateEventW
GlobalFlags
WriteFile
GetFileTime
lstrlenW
ReleaseMutex
ReleaseMutex
GetCurrentProcessId
GetDriveTypeA
GetEnvironmentVariableW
FindAtomA
LoadLibraryW
TlsGetValue
GetPrivateProfileStringA
InitializeCriticalSection
IsBadStringPtrW
LocalFree
HeapCreate
user32
GetSysColor
DrawStateW
GetKeyboardType
GetClientRect
CallWindowProcW
IsWindow
GetSysColor
CreateWindowExA
DispatchMessageA
SetFocus
GetClassInfoA
EndDialog
DrawTextA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE